Unit 1
Introduction to Internet
Basics
552 CS 1105 Fundamentals of IT
Moses Sibande
Objectives
At the end of the course, you should be able to:
• Discuss the concepts and applications of Internet in Information
Technology.
• Explain the basics of network hardware.
• Explain the modern technologies in information technology, their
hardware, software and uses.
• Explain the impact of IT in Social structure.
• Discuss the knowledge, skills, concepts and applications of
Information Technology in our daily life.
Introduction
• A computer is an electronic device that accepts input data, process that
data according to programmed instructions, output the results of this
processing, and store data and instructions for future use.
• Ex mobile phones, television, smart watches etc.
Data is unorganized pieces of information.
• Think about it like : Before we bake a cake, we need ingredients? Flour,
sugar, eggs. These are the raw materials.
• In the world of technology, 'data' is basically the raw materials – the
individual facts and figures – that we collect.
Cont.
• Information is the processed data. This processing happens based on
a set of pre-defined instructions that a programmer writes. These
instructions tell the computer on how to handle your data.
For example, can hand data about your bank account. Your ATM pin.
The ATM asks for your debit card and pin. With this data the ATM gives
info about your account.
Hardware & software
• Imagine your body – your hands, feet, brain, muscles. These
are all physical parts you can see and touch. In a computer,
hardware is exactly like that: it's all the physical stuff you can
see and touch. The screen, keyboard, mouse, the computer box
itself, and all the parts inside it like the processor and memory
• Now, think about your mind – your thoughts, ideas,
instructions, and the skills you've learned. You can't touch your
thoughts, but they tell your body what to do, right? Software is
like the mind of the computer. It's the set of instructions and
programs that tell the hardware what to do and how to do it.
You can't touch software, but it makes the computer work.
Information Technology
• "Think of Information Technology (IT) as all the
tools (apps), systems, and methods we use to
work with information."
• Information: We already know this is data that has
been organized or processed and made meaningful.
• Technology: These are the tools we use – specifically,
computers, networks, and all the devices connected to
them.
• "So, IT is essentially using computers and networks
to create, store, find, share, and protect
information."
Cont.
Example
• When you send a WhatsApp message, or an email, or post on TikTok –
you're using IT. Your phone (hardware) is running the app (software)
to send your message (information/data) across the internet (a
network).
What is a computer Network
• A computer network is a group of computers and other devices (like
printers, servers, and smartphones) that are connected to each other
to share information, resources, and services.
Benefits of using a network
1. Communication & Collaboration
• Applications (tools) like email, Zoom, Slack, and Google Drive all run over networks.
• Teams in different locations can work together in real time.
2. Data Access & Storage
• Networks allow employees to access company files and databases
from different departments or branches.
• Centralized storage means data security, backup, and efficiency.
3. Customer Interaction
• Websites, apps, e-commerce platforms—all rely on computer networks.
• Businesses gather customer data and deliver services through networks.
Cont.
4. Operations & Automation
• Point-of-sale systems, inventory tracking, CRM software (like
Salesforce)—all depend on networks.
Understanding network Security & Risk helps managers
protect their company from cyber threats like data
breaches and ransomware.
Some important terms
• LAN (Local Area Network): Small networks within a
building (e.g., office network).
• WAN (Wide Area Network): Larger networks that
connect buildings, cities, or countries.
• Wi-Fi: Wireless networking—what connects
laptops/phones to the internet without cables.
• Server: A computer that provides data or services to
others on the network.
The Internet
• The Core Idea: A "Network of Networks"
• "At its most basic, the internet is simply a massive,
global network of connected computers and
devices."
• "Think of it like roads. You have small roads in your
neighborhood, which connect to bigger roads, which
connect to highways. The internet is like the ultimate,
worldwide highway system for information."
• "Every computer, phone, tablet, smart TV – even some
refrigerators and cars – can connect to this network."
Cont.
How Things Connect: The "Roads and Bridges"
• "So how do all these devices connect? It's through
different kinds of 'roads' and 'bridges':"
• Wires like the:
• Ethernet cables: The cables you might plug into your computer
for a direct connection.
• Fiber optic cables: These are like super-fast highways made of
glass or plastic, carrying information using light signals. These
run under oceans and across continents!" (You can show a
picture of an undersea cable map if you like).
• Copper wires: Like the ones your phone uses, which carry
electrical signals.
Cont.
• Wireless: "And then there's wireless, like Wi-Fi or
mobile data on your phone. Even though it feels like air,
this wireless connection eventually goes back to those
physical wires to get to the wider internet."
• Routers & Switches: "Think of these as the 'traffic
cops' or 'intersections' of the internet. They direct the
information (our data 'cars') to the right place."
IP (Internet Protocol) Address
• What is an IP Address? An IP (Internet Protocol) is a numerical
labelled address assigned to each device (e.g., computer, printer,
smartphone) connected to a computer network that uses the Internet
Protocol for communication.
It serves two main functions:
• Host or Network Interface Identification: It uniquely identifies a
specific device on a network.
• Location Addressing: It indicates where the device is located on the
network, enabling routing of data packets to their correct destination.
Types of IP Addresses
IPv4 (Internet Protocol version 4)
• The most widely used version.
• Consists of 32 bits, typically represented as four sets of numbers
separated by dots. (e.g. [Link]). Each set (octet) can range from
0 to 255.
• Supports approximately 4.3 billion unique addresses.
• Due to the rapid growth of the internet, IPv4 addresses are depleting,
leading to the development of IPv6.
Cont.
IPv6 (Internet Protocol version 6)
• Designed to replace IPv4 due to address exhaustion.
• Consists of 128 bits, providing a vastly larger address space
(approximately 3.4×1038 unique addresses).
• Represented as eight groups of four hexadecimal digits separated by
colons. (e.g. [Link])
• Offers improved efficiency and built-in security features.
Public vs. Private IP Addresses:
Public IP Address:
• Globally unique and assigned to your network by your Internet
Service Provider (ISP).
• Directly accessible from the internet.
• Identifies your entire network to the outside world.
Private IP Address:
• Used within a private network (e.g., your home network, a company's
internal network)
Cont.
• Not routable on the public internet.
Common private IP address ranges include:
• [Link] to [Link]
• [Link] to [Link]
• [Link] to [Link]
Resolving Domain Names (DNS)
• As mentioned previously, the internet primarily uses IP addresses for
communication, but humans find it easier to remember names. This is
where the Domain Name System (DNS) comes in.
• Purpose: DNS translates human-readable domain names (like
[Link]) into machine-readable IP addresses (like
[Link])
How DNS works
• You type a domain name into your web browser tab something like
[Link]
• Your computer sends a query to a DNS resolver (often your ISP's DNS
server or a public one like Google DNS).
• If the resolver has the IP address cached, it returns it immediately.
• If not, the resolver queries a hierarchy of DNS servers:
• Root Servers: Know where to find TLD servers.
• TLD Servers (.com, .org, etc.): Know where to find authoritative name servers
for specific domains.
• Authoritative Name Servers: Hold the actual mapping for the domain name to
its IP address.
Cont.
• Once the IP address is found, it's returned to your computer.
• Your computer then uses this IP address to establish a connection
with the server hosting [Link]
TCP/IP and its Services
• TCP/IP (Transmission Control Protocol/Internet Protocol) is the
foundational suite of communication protocols used for the Internet
and most other computer networks. It's a set of rules that dictate how
data is formatted, addressed, transmitted, routed, and received over
networks.
• A protocol is essentially a set of rules or a standard that defines how
data is formatted, transmitted, received, and processed between two
or more devices on a network.
Application Layer
• Provides network services directly to end-user applications.
Services (Protocols) Examples:
• HTTP/HTTPS (Hypertext Transfer Protocol/Secure): For web Browse.
• FTP (File Transfer Protocol): For transferring files.
• SMTP (Simple Mail Transfer Protocol): For sending emails.
• POP3/IMAP (Post Office Protocol 3/Internet Message Access Protocol): For
receiving emails.
• DNS (Domain Name System): For resolving domain names.
• SSH (Secure Shell): For secure remote access to computers.
• Telnet (Telecommunication Network): For remote access (less secure than
SSH).
Transport Layer
• Handles end-to-end communication and data integrity between
applications.
Key Protocols
TCP (Transmission Control Protocol):
• Connection-oriented: Establishes a connection before transmitting data.
• Reliable: Guarantees delivery of data, retransmits lost packets, and ensures data arrives in
order.
• Used for applications where data integrity is critical (e.g., web Browse, email, file transfers).
UDP (User Datagram Protocol):
• Connectionless: Does not establish a connection before sending.
• Unreliable: Does not guarantee delivery or order.
• Faster and lower overhead. Used for applications where speed is more critical than absolute
reliability (e.g., streaming video/audio, online gaming, DNS queries).
Internet Layer (or Network
Layer)
• Responsible for logical addressing (IP addresses) and routing data
packets across different networks.
Key Protocols
• IP (Internet Protocol): Defines how packets are addressed and
routed. It's connectionless and unreliable itself, relying on TCP for
reliability when needed.
• ICMP (Internet Control Message Protocol): Used for error reporting
and network diagnostics (e.g. ping command)
Network Access Layer (or Link
Layer/Data Link & Physical
Layer):
• Deals with the physical transmission of data over the network
medium (Ethernet cables, Wi-Fi, fiber optics).
• Translates IP packets into frames that can be sent over the physical
network.
• Protocols/Technologies: Ethernet, Wi-Fi (802.11), PPP (Point-to-Point
Protocol).
• MAC Address (Media Access Control): A physical, unique identifier
burned into network interface cards (NICs) at this layer.
WWW (World Wide Web)
• What is the WWW? Often confused with the "Internet," the World
Wide Web (WWW or simply "the Web") is a system of interlinked
hypertext documents and other web resources, accessed via the
Internet. It's a specific application built on top of the Internet's
infrastructure.
Key Concepts of the www
• Hypertext: Text that contains links to other text or resources.
• Hyperlinks: The clickable connections that link documents and
resources together.
• Web Pages: Documents typically written in HTML (Hypertext Markup
Language) that are accessible over the internet.
• Websites: Collections of related web pages and other web resources.
• Web Servers: Computers that store web pages and other content and
deliver them to web browsers upon request.
• Web Browsers: Software applications (like Chrome, Firefox, Edge) that
retrieve and display web pages.
How the www works
• You type a URL (Uniform Resource Locator - the address of a web page)
into your web browser.
• The browser uses DNS to find the IP address of the web server hosting
that URL.
• The browser then sends an HTTP/HTTPS request to that web server (via
TCP/IP).
• The web server processes the request and sends the requested web
page content (HTML, CSS, JavaScript, images, etc.) back to your browser.
• Your browser renders the content, displaying the web page on your
screen.
Setting up a connection
• Setting up an Internet connection involves hardware, software, and
proper configuration to ensure connectivity. The process can vary
depending on whether the connection is wired (e.g., DSL, fiber) or
wireless (e.g., Wi-Fi).
• A setup includes modem selection, hardware and software,
1. Hardware Requirements
You will need one of the following:
• A network device that connects to your computer like a Modem or a
Router
• Network Interface card to provide interface to wired and wireless
connection
• Ethernet Cable
2. Selection of a modem
When selecting a modem, it's crucial to consider the type of Internet connection you have, as different modems work for
different technologies:
DSL Modem:
o Required if you have a Digital Subscriber Line (DSL) connection from your ISP.
o Connects to the phone line and provides Internet access via telephone infrastructure.
Cable Modem:
o Used for cable Internet connections.
o Connects to a coaxial cable (usually the same line used for cable TV).
Fiber Modem (ONT - Optical Network Terminal):
o Used for fiber-optic Internet connections, which provide the fastest speeds.
o Converts light signals from the fiber-optic cable into electronic signals that your device can use.
3. Software Requirements
• Software is necessary to manage the hardware, configure the
connection, and ensure security. Some software may be provided by
your ISP, while others may come pre-installed on your device.
• Operating System (OS): OS (e.g., Windows, macOS, Linux) must have
built-in support for networking to connect to the Internet.
• Network drivers, this is a program that facilitates the interface
between the NIC and the Operating system. Some modem might
need a software to be installed on the computer to work properly
• Web browser to browse websites on the internet
• Security software like fire walls and anti-virus
Modem configuration
Steps in configuring a modem
• Plug the modem to power on the modem and Connect it to your
Internet source (e.g., phone line for DSL, coaxial cable for cable
Internet).
• Access Modem Configuration Panel by Opening a web browser and
enter the default IP address of the modem (often [Link] or
[Link]).
• Login using the default username and password (usually provided by
the manufacturer or ISP).
Cont.
• Enter ISP setting and configure settings like the username, password, IP
address
• Configure DHCP/PPPoE:
o Depending on your Internet type, you may need to select between DHCP (Dynamic Host Configuration
Protocol) or PPPoE (Point-to-Point Protocol over Ethernet).
o DHCP is used for automatic IP configuration.
o PPPoE requires a username and password from your ISP for authentication.
• Security Settings:
o Change the default modem password to something more secure.
o Enable firewall and configure port forwarding if necessary for specific applications.
Cont.
. Wi-Fi Configuration (if applicable):
o For wireless routers, configure the Wi-Fi settings (SSID, password, security protocol like
WPA2/WPA3).
Test the Connection:
o Once configured, test the Internet connection by connecting your device to the modem or
router.
o Open a web browser and try visiting a few websites to ensure everything is functioning
correctly.
Introduction to Electronic Mail
(Email)
• Electronic Mail (Email) is a method of exchanging digital messages over
the Internet. It is one of the most widely used forms of communication,
both for personal and business purposes. Email allows users to send
and receive messages, files, and other attachments almost instantly to
recipients across the globe.
• Key Features:
• Instant communication across large distances.
• Allows for the transmission of text, multimedia, and attachments.
• Stores messages for later retrieval.
• Supports group conversations, file sharing, and scheduling.
How Email works
The process of sending and receiving emails involves several key components and steps:
• Email Client: A software program or web-based service (e.g., Gmail, Outlook) that allows users to send,
receive, and manage emails.
• Email Server: A system that handles the routing and delivery of emails. Two common protocols are used:
• SMTP (Simple Mail Transfer Protocol): Handles the sending of emails.
• POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol): Handle receiving and storing
emails.
Email Processes:
• Composing: A user creates an email using their email client, enters the recipient's email address, subject,
and body, and attaches any necessary files.
• Sending: Once the email is sent, it goes through the SMTP server, which forwards it to the recipient’s
email server.
• Receiving: The recipient’s email client retrieves the email from their POP3 or IMAP server, and the
message is displayed in their inbox
Benefits of using email
Speed: Emails can be sent instantly, even across continents, making it faster than traditional mail.
Cost-effective: Sending emails is usually free or very low-cost, especially when compared to postal
mail or phone calls.
Global Reach: You can communicate with people all over the world.
Record Keeping: Emails provide a written record of communication, which can be stored and
retrieved later.
Attachment Support: Files like documents, images, and videos can be easily attached to emails.
Organization: Modern email clients provide features to organize, search, and filter emails based on
sender, date, or subject.
Email Names and Addresses
An email address is a unique identifier for an email account. It follows a specific format, which includes:
1. Username: The part before the "@" symbol, identifying the individual or organization.
2. @ Symbol: Separates the username from the domain.
3. Domain Name: The domain part of the email address represents the mail server (e.g., [Link],
[Link], [Link]).
Types of Email Addresses
• Personal Email Address: Used by individuals for personal
communication (e.g., johnsmith@[Link]).
• Business/Professional Email Address: Used for professional or
organizational purposes (e.g., [Link]@[Link]).
• Alias Email Address: An alternate name for an email account that
redirects to a primary email address
Components of an email
• To: The primary recipient(s) of the email.
• CC (Carbon Copy): Allows the sender to send a copy of the email to
secondary recipients. Everyone receiving the email can see who else
received it.
• BCC (Blind Carbon Copy): Allows the sender to send a copy of the
email to recipients without revealing their email addresses to others.
• Subject Line: A brief description of the email’s content.
• Body: The main message content of the email. This can include plain
text, rich text, and multimedia.
Address book
• The Address Book in an email client is a tool used to store contact information.
It allows for easy retrieval and management of email addresses and other
details about individuals or organizations. Some of its features include:
• Storing Contacts: Users can store email addresses, names, phone numbers,
and additional information for contacts.
• Grouping Contacts: Contacts can be organized into groups (e.g., work contacts,
family, friends) for easier email management.
• Auto-Suggestions: Modern email clients provide auto-suggestions as you type
in the recipient field, helping you quickly find contacts.
• Import/Export: You can import contacts from other services (e.g., Gmail,
Outlook) or export your address book for backup or transfer.
File Attachments
• File Attachments allow you to send files along with your email message. These can include
documents, images, videos, spreadsheets, and more.
• Attaching Files:
• Most email clients have an "Attach File" button or paperclip icon. Clicking this allows the user to
select a file from their computer or device to attach.
• Files can also be dragged and dropped directly into the email window.
• Attachment Considerations:
• File Size Limit: Most email services impose a limit on the size of file attachments (typically around 25
MB). For larger files, alternative methods like cloud storage links (Google Drive, Dropbox) are used.
• File Format: Attachments can be in various formats such as .pdf, .docx, .jpg, .mp4. Be mindful that
some file types (like .exe) may be blocked for security reasons.
• Security: Be cautious when opening attachments from unknown senders, as they may contain
malware.